POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets
Abstract
References
Recommendations
Accountable privacy based on publicly verifiable secret sharing
ICACT'10: Proceedings of the 12th international conference on Advanced communication technologyAs developing the internet a variety of services emerge and service providers serve services such as using users' private information. Service providers require many types of information related users even including sensitive private information to ...
Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes
IMIS '14: Proceedings of the 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous ComputingDuring the execution of a business process users need to be authenticated by multiple component service providers, while their identities need to be shared and propagated across multi-domain in a privacy-preserving fashion. An anonymous credential-based ...
Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts
Data Privacy Management, Cryptocurrencies and Blockchain TechnologyAbstractAnonymity revocation is an essential component of credential issuing systems since unconditional anonymity is incompatible with pursuing and sanctioning credential misuse. However, current anonymity revocation approaches have shortcomings with ...
Comments
Information & Contributors
Information
Published In
- Chair:
- Jianying Zhou,
- Co-chair:
- Tony Q. S. Quek,
- Program Chairs:
- Debin Gao,
- Alvaro Cardenas
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Poster
Funding Sources
- Cyber Security Cooperative Research Centre
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 62Total Downloads
- Downloads (Last 12 months)62
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in